User login
Search Blogs
Bloggers
Matt Hunter's blog
05
Jul
2013
This week I spent copying some of my hard copy paper flow chart documentation to digital versions
I also compiled a list of possible security vulnerabilities in cloud services and prioritised them.
Finally I began working on my presentation to give to the Comp520 Class this wednesday
28
Jun
2013
This week i began automated testing of cloud services with the use of my automation script ive been writing for the past few weeks.
I also began looking at session Id analysis
And finally i started (but didnt get very far) formally writing down what I've discovered in anticipation of my final report
07
Jun
2013
No honours work this week. Trying to get 560 and the FPGA board working properly
10
May
2013
Just about completed script for automatically scanning a cloud service for vulnerabilities
03
May
2013
This week I began the creating an automatic script to test cloud software for vulnerablilities. Although It is not yet finished I don't invisage it taking to much longer
01
Apr
2013
This week i continued to investigate the data structures used to transfer infomation between the cloud and the client. As well as looking at client side javascript cloud services use to make their services work
22
Mar
2013
This week I began to look at cloud computing's data processing both server side and client side, to gain an appreciation of how it works. I also completed a simple flow chart and table to help me further understand the structures used to present cloud computing to users.
15
Mar
2013
This week a large amount of my time was spent on the proposal and other projects,
However I did manage to investigate datatransfers for cloud storage systems.
08
Mar
2013
The first half of this week I was exploring different tools that can be used for my project. Some of these tools included the tor browser for anonymity, a large range of Firefox add-ons preforming a range of functions such httpfox for viewing and modifying cookies and params submitted by the browser, and some low level network tools such as netcat and openssl for writing scripts to interact with the drive webservers through http requests on the command line.
The Second half of the week I began to scope my target google drive, I began collating the structure of the site, with infomation such as the urls and parameters used, as well as further research into web specific attacking techniques such as Cookie "Bit diddling"(Real term from Hacking Web Applications Exposed)